The Hacker’s Dilemma: Applying Game Theory to the Hacker-Enterprise Relationship
نویسنده
چکیده
In the article “Immunizing the Internet, OR: How I Learned to Stop Worrying and Love the Worm” (Harvard Law Review Volume 119, June 2006, Number 8), the authors argue that certain kinds of cybercrime should be treated differently from other crimes because of cultural features of the hacking community, and because of the net benefit to companies from minimally-harmful hacking. From the perspective of game theory, the relationship between hackers and enterprises is analogous to the classic Prisoner’s Dilemma game; analysis in terms of this scenario leads to strategic recommendations for policy-makers and enterprises to increase “benevolent” hacking. The results of this analysis support both the traditional law-enforcement solutions and the more lenient approach suggested by “Love the Worm”. The Prisoner’s Dilemma One of the classic strategic situations in game theory is called the Prisoner’s Dilemma. A short story motivates the game: Two criminals, Player 1 and Player 2, are accomplices in a bank robbery, and are later arrested. The police place them in separate rooms and offer them both the same plea-bargain deal, which is as follows. The police don’t have enough evidence to prosecute either prisoner for the bank robbery, but they can convict each of them on a lesser charge. However, if one prisoner will testify against the other, he will receive a reduced sentence, and his accomplice will be convicted on the greater charge. If both testify against each other, both will be convicted, though with a reduced sentence. Each player has to choose, independently,
منابع مشابه
Economic and Policy Implications of Restricted Patch Distribution
In this paper, we study how restricting the availability of patches to legal users impacts vendor’s profits, market share, software maintenance decisions, and welfare outcomes. Prior work on this topic assumes that hacker’s effort is independent of the vendor’s decision to release the patch freely or not. Clearly, if the patch is not available to everyone, the hacker finds it easier to exploit ...
متن کاملModeling Cooperation between Nodes in Wireless Networks by APD Game
Cooperation is the foundation of many protocols in wireless networks. Without cooperation, the performance of a network significantly decreases. Hence, all nodes in traditional networks are required to cooperate with each other. In this paper, instead of traditional networks, a network of rational and autonomous nodes is considered, which means that each node itself can decide whe...
متن کاملChanges in a Service Oriented Enterprise: A Game Theory Approach
Service Oriented Enterprises (SOEs) are subject to constant change and variation. In this paper, the changes are considered from an economic perspective based on service culture notion. Once a change is implemented, the costs of some member services may increase, whereas the costs of some other services may reduce. We construct a game theoretic model trying to capture the possible conflicting i...
متن کاملModeling Cooperation between Nodes in Wireless Networks by APD Game
Cooperation is the foundation of many protocols in wireless networks. Without cooperation, the performance of a network significantly decreases. Hence, all nodes in traditional networks are required to cooperate with each other. In this paper, instead of traditional networks, a network of rational and autonomous nodes is considered, which means that each node itself can decide whe...
متن کاملApplication of Stochastic Optimal Control, Game Theory and Information Fusion for Cyber Defense Modelling
The present paper addresses an effective cyber defense model by applying information fusion based game theoretical approaches. In the present paper, we are trying to improve previous models by applying stochastic optimal control and robust optimization techniques. Jump processes are applied to model different and complex situations in cyber games. Applying jump processes we propose some m...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010